[EMAIL PROTECTED] (Brian McSpadden) writes: > Your problem with doing this is this line right below...you have no > idea what your authentication secret is. This is a closely guarded > secret of Vonage. They don't have any interest in letting anyone do > this. The closest you could do would be a softphone, unlimited inbound > and 500 mins outbound calling. There are sample configs floating > around out there to make that work. > > On Fri, 9 Jul 2004 10:28:06 -0400 (EDT), [EMAIL PROTECTED] > <[EMAIL PROTECTED]> wrote: > > > Authorization: Digest username="1905XXXXXXX", realm="216.115.25.187", > > > nonce="720170349", uri="sip:bspgroup1.bsp.vonage.net:5061", > > > response="6a2fe5ec7b98a098aaf82a7dfc1340aa", algorithm=MD5
I thought the same thing at first, but then started wondering about a man-in-the-middle attack. Supposed asterisk simply used the Motorola ATA as a "dongle" and forwarded any tough authentication questions to the ATA and forwarded the ATA's answers back to the remote SIP server? Could that be made to work? -wolfgang -- Wolfgang S. Rupprecht http://www.wsrcc.com/wolfgang/ openbsd amd64 http://www.wsrcc.com/wolfgang/ftp/asterisk-openbsd35.patch _______________________________________________ Asterisk-Users mailing list [EMAIL PROTECTED] http://lists.digium.com/mailman/listinfo/asterisk-users To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users